Pramod Rathore - Academia.edu (original) (raw)
Papers by Pramod Rathore
Cyber Security in Parallel and Distributed Computing
2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017
Data mining is the process of extracting the useful information from the large existing datasets.... more Data mining is the process of extracting the useful information from the large existing datasets. Data Mining allows users to analyze data from various dimension, categorize the data, and present a review on the identified relationship between the data. This paper describes the use of j48 data mining algorithm to predict the recurrence of cancer based on the dataset of breast cancer. If cancer comes back after treatment, whether in the same place it first started, or in any other part of the body is called recurrent cancer. In this paper we use J48 data mining algorithm on the data set of breast cancer. J48 is a java implementation for C4.5 algorithm provided by Weka tool. Here we analyze the decision tree generated by the algorithm using 10-fold cross validation method to predict the recurrent events, based on the attributes such as node-caps, degree of malignancy, age, tumor-size, menopause, irraradiate etc. This process of data mining will help to identify what range or value of various attribute causes the recurrence cancer.
For details of our global editorial offices, customer services, and more information about Wiley ... more For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com. Limit of Liability/Disclaimer of Warranty While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Handbook of IoT and Big Data, 2019
2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013
Present, fast growing century, includes people for fast and efficient travelling of their path fr... more Present, fast growing century, includes people for fast and efficient travelling of their path from source to destination by covering at least one of the facilities in their path. As everyone in today's scenario wants to cover their distance from source by attending some facilities in their path and then reach to destination within a required time. This paper focus on algorithm with time dependent shortest path for optimal route planning via facility (i.e petrol, grocery etc). The algorithm here includes optimal path from source to destination which minimize the travel time and provide with covering at least one facility within the required time. We present here an algorithm for route planning which minimize the travel distance as well as travel time from source to destination.
Telecommunications and Radio Engineering, 2021
TCP-Transmission Control protocol is a connection oriented and reliable process-to-process commun... more TCP-Transmission Control protocol is a connection oriented and reliable process-to-process communication on the transport layer of tcp/ip model. TCP guarantees with the end-to-end flow control, error control and congestion control. In the past, tcp was brought to work with the bulky networks where the cause of losses is specially the network congestion. TCP was introduced to work with the wired networks where the cause of losses is mainly the network congestion. In recent years, wireless networking is becoming more and more popular. Wireless Sensor Networks consists of hundreds and thousands of micro sensor nodes that monitor a remote environment by data aggregation from individual nodes and transmitting this data to the base station for further processing and inference. The energy of the battery operated nodes is the most vulnerable resource of the WSN, which is depleted at a high rate when information is transmitted, because transmission energy is dependent on the distance of tran...
In this paper proposes a Randomized Virtual Scanning Technique to optimize the performance for th... more In this paper proposes a Randomized Virtual Scanning Technique to optimize the performance for the road network surveillance. The Sensor it may be scan the area of road network. The road network is show as a graph. So it may scan the area through genetic algorithm. The main focus is to improve the energy and performance of the sensor scanning process. The sensing programming rule plays a job for target intrusion detection, utilizing the distinctive options of road networks. Sensor it may be scan alternate and sequence node so that’s why 100 % target detection guaranty for w seconds (i.e single sensor takes time to scan the area) along road segments, creating waves of sensing activities, called randomized virtual scanning. Here they present a scan-based algorithm, which improves further energy efficiency or performance of surveillance in road networks.
Lately, the security comprises the most vital segment for people. Right now, expense was most not... more Lately, the security comprises the most vital segment for people. Right now, expense was most noteworthy reason. Anormous framework was valuable in terms of lessening expense for observing development of outer area. Here, a realtime acknowledgment framework is suggested that will prepare for dealing with pictures in all respects rapidly. The principle target of our proposed mechanism is to ensure home, office with help of perceiving individuals. For such reason, the PIR sensor is utilized for identify development on particular territory. A short time later, the Raspberry Pi will catch the pictures. At that point, the face will be identified and perceived in the caught picture. At long last, the pictures and warnings that are transferred to a cell phone dependent IoT in utilizing Telegram application. Our proposed work framework was constant, quick as well as having less device performing capacity. The test analysis demonstrates that the proposed methodology was acknowledgment framew...
TCP-transmission manipulate protocol is a connection oriented and reliable process-to-process com... more TCP-transmission manipulate protocol is a connection oriented and reliable process-to-process communication on the transport layer of tcp/ip model. TCP guarantees with the end-to-end flow control, error control and congestion control ears in the past, tcp was brought to work with the stressed out networks where the cause of losses is specially the network congestion. TCP was introduced to work with the wired networks where the cause of losses is mainly the network congestion. In recent years, wireless networking is becoming more and more popular. In current years, wireless networking is turning into increasingly more famous. A full-size quantity of performance degradation is found while conventional tcp versions are used with the wi-fi networks. Wireless networks are greater prone to the losses due to the inherent impairments of wi-fi verbal exchange. This paper surveys various TCP variants with wireless multi-hop networks. Simulation is carried out with NS 2.35.
She earned UGC-NET qualified with 18+ years of experience in teaching and research. She has autho... more She earned UGC-NET qualified with 18+ years of experience in teaching and research. She has authored/coauthored more than 40 research papers in various peer-reviewed national/international journals and conferences. She has also edited/authored books with national/international publishers (IGI Global, Apple Academic Press, and CRC Press) and has contributed many chapters in edited books published by IGI global, Springer, Elsevier, and CRC Press. She has also published two patents in renewable energy. Currently she is guiding PhD scholars in sentiment analysis, educational data mining, Internet of Things, brain-computer interface, web service architec ture, and natural language processing. She is associated with various profes sional bodies in different capacities and is a life member of the Computer Society of India, IETA, ACM CSTA, and a senior member of the Science and Engineering Institute (SCIEI).
Proceedings of the First International Conference on Information Technology and Knowledge Management, Jan 29, 2018
Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve i... more Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve idea that may be used to create quicker, smaller, and greater green cryptographic keys. Ecc generates keys through the houses of the elliptic curve equation in area of the traditional approach of generation as the manufactured from very huge prime numbers. The technology may be used at the side of maximum public key encryption strategies, together with rsa, and diffiehellman. Consistent with some researchers, ecc can yield a degree of safety with a 164-bit key that different structures require a 1,024-bit key to advantage. Because of the fact ecc helps to establish equivalent safety with decrease computing power and battery useful resource usage, it's far turning into widely used for cellular programs. In this work we implement ECC Algorithm with altered approach for encrypting and decrypting the probe image and encrypted images respectively. Our proposed approach has proposed that the elapsed time to perform the task for same input image is less than the conventional approach. We have run the cryptography procedure for n number of iterations in order to get the accurate results and compared that particular elapsed time with the conventional approach. We have contemplated an approach in which we consider region of interest (ROI) unlike the conventional approach, the advantage of the proposed work is we n need not to cover all the pixel vectors but only those which is required to be encrypted or decrypted. The proposed work has applied ecc algorithm for error calculations which has been shown in the experimental results. The proposed work has compared the result in both the aspects in terms of elapsed time to perform the algorithm and ROI feature to get implemented at the same time.
Cyber Security in Parallel and Distributed Computing
2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017
Data mining is the process of extracting the useful information from the large existing datasets.... more Data mining is the process of extracting the useful information from the large existing datasets. Data Mining allows users to analyze data from various dimension, categorize the data, and present a review on the identified relationship between the data. This paper describes the use of j48 data mining algorithm to predict the recurrence of cancer based on the dataset of breast cancer. If cancer comes back after treatment, whether in the same place it first started, or in any other part of the body is called recurrent cancer. In this paper we use J48 data mining algorithm on the data set of breast cancer. J48 is a java implementation for C4.5 algorithm provided by Weka tool. Here we analyze the decision tree generated by the algorithm using 10-fold cross validation method to predict the recurrent events, based on the attributes such as node-caps, degree of malignancy, age, tumor-size, menopause, irraradiate etc. This process of data mining will help to identify what range or value of various attribute causes the recurrence cancer.
For details of our global editorial offices, customer services, and more information about Wiley ... more For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com. Limit of Liability/Disclaimer of Warranty While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Handbook of IoT and Big Data, 2019
2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013
Present, fast growing century, includes people for fast and efficient travelling of their path fr... more Present, fast growing century, includes people for fast and efficient travelling of their path from source to destination by covering at least one of the facilities in their path. As everyone in today's scenario wants to cover their distance from source by attending some facilities in their path and then reach to destination within a required time. This paper focus on algorithm with time dependent shortest path for optimal route planning via facility (i.e petrol, grocery etc). The algorithm here includes optimal path from source to destination which minimize the travel time and provide with covering at least one facility within the required time. We present here an algorithm for route planning which minimize the travel distance as well as travel time from source to destination.
Telecommunications and Radio Engineering, 2021
TCP-Transmission Control protocol is a connection oriented and reliable process-to-process commun... more TCP-Transmission Control protocol is a connection oriented and reliable process-to-process communication on the transport layer of tcp/ip model. TCP guarantees with the end-to-end flow control, error control and congestion control. In the past, tcp was brought to work with the bulky networks where the cause of losses is specially the network congestion. TCP was introduced to work with the wired networks where the cause of losses is mainly the network congestion. In recent years, wireless networking is becoming more and more popular. Wireless Sensor Networks consists of hundreds and thousands of micro sensor nodes that monitor a remote environment by data aggregation from individual nodes and transmitting this data to the base station for further processing and inference. The energy of the battery operated nodes is the most vulnerable resource of the WSN, which is depleted at a high rate when information is transmitted, because transmission energy is dependent on the distance of tran...
In this paper proposes a Randomized Virtual Scanning Technique to optimize the performance for th... more In this paper proposes a Randomized Virtual Scanning Technique to optimize the performance for the road network surveillance. The Sensor it may be scan the area of road network. The road network is show as a graph. So it may scan the area through genetic algorithm. The main focus is to improve the energy and performance of the sensor scanning process. The sensing programming rule plays a job for target intrusion detection, utilizing the distinctive options of road networks. Sensor it may be scan alternate and sequence node so that’s why 100 % target detection guaranty for w seconds (i.e single sensor takes time to scan the area) along road segments, creating waves of sensing activities, called randomized virtual scanning. Here they present a scan-based algorithm, which improves further energy efficiency or performance of surveillance in road networks.
Lately, the security comprises the most vital segment for people. Right now, expense was most not... more Lately, the security comprises the most vital segment for people. Right now, expense was most noteworthy reason. Anormous framework was valuable in terms of lessening expense for observing development of outer area. Here, a realtime acknowledgment framework is suggested that will prepare for dealing with pictures in all respects rapidly. The principle target of our proposed mechanism is to ensure home, office with help of perceiving individuals. For such reason, the PIR sensor is utilized for identify development on particular territory. A short time later, the Raspberry Pi will catch the pictures. At that point, the face will be identified and perceived in the caught picture. At long last, the pictures and warnings that are transferred to a cell phone dependent IoT in utilizing Telegram application. Our proposed work framework was constant, quick as well as having less device performing capacity. The test analysis demonstrates that the proposed methodology was acknowledgment framew...
TCP-transmission manipulate protocol is a connection oriented and reliable process-to-process com... more TCP-transmission manipulate protocol is a connection oriented and reliable process-to-process communication on the transport layer of tcp/ip model. TCP guarantees with the end-to-end flow control, error control and congestion control ears in the past, tcp was brought to work with the stressed out networks where the cause of losses is specially the network congestion. TCP was introduced to work with the wired networks where the cause of losses is mainly the network congestion. In recent years, wireless networking is becoming more and more popular. In current years, wireless networking is turning into increasingly more famous. A full-size quantity of performance degradation is found while conventional tcp versions are used with the wi-fi networks. Wireless networks are greater prone to the losses due to the inherent impairments of wi-fi verbal exchange. This paper surveys various TCP variants with wireless multi-hop networks. Simulation is carried out with NS 2.35.
She earned UGC-NET qualified with 18+ years of experience in teaching and research. She has autho... more She earned UGC-NET qualified with 18+ years of experience in teaching and research. She has authored/coauthored more than 40 research papers in various peer-reviewed national/international journals and conferences. She has also edited/authored books with national/international publishers (IGI Global, Apple Academic Press, and CRC Press) and has contributed many chapters in edited books published by IGI global, Springer, Elsevier, and CRC Press. She has also published two patents in renewable energy. Currently she is guiding PhD scholars in sentiment analysis, educational data mining, Internet of Things, brain-computer interface, web service architec ture, and natural language processing. She is associated with various profes sional bodies in different capacities and is a life member of the Computer Society of India, IETA, ACM CSTA, and a senior member of the Science and Engineering Institute (SCIEI).
Proceedings of the First International Conference on Information Technology and Knowledge Management, Jan 29, 2018
Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve i... more Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve idea that may be used to create quicker, smaller, and greater green cryptographic keys. Ecc generates keys through the houses of the elliptic curve equation in area of the traditional approach of generation as the manufactured from very huge prime numbers. The technology may be used at the side of maximum public key encryption strategies, together with rsa, and diffiehellman. Consistent with some researchers, ecc can yield a degree of safety with a 164-bit key that different structures require a 1,024-bit key to advantage. Because of the fact ecc helps to establish equivalent safety with decrease computing power and battery useful resource usage, it's far turning into widely used for cellular programs. In this work we implement ECC Algorithm with altered approach for encrypting and decrypting the probe image and encrypted images respectively. Our proposed approach has proposed that the elapsed time to perform the task for same input image is less than the conventional approach. We have run the cryptography procedure for n number of iterations in order to get the accurate results and compared that particular elapsed time with the conventional approach. We have contemplated an approach in which we consider region of interest (ROI) unlike the conventional approach, the advantage of the proposed work is we n need not to cover all the pixel vectors but only those which is required to be encrypted or decrypted. The proposed work has applied ecc algorithm for error calculations which has been shown in the experimental results. The proposed work has compared the result in both the aspects in terms of elapsed time to perform the algorithm and ROI feature to get implemented at the same time.